cisco-torch : mass scanning, fingerprinting, and exploitation tool
☆44Sep 20, 2015Updated 10 years ago
Alternatives and similar repositories for cisco-torch
Users that are interested in cisco-torch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆45Dec 24, 2018Updated 7 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- General Scripts to help with various types of SQL Injection☆31Jan 31, 2014Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Steal users password with a fake sudo function.☆44Feb 29, 2024Updated 2 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆114Mar 12, 2024Updated 2 years ago
- t50 : Multi-protocol packet injector tool☆25Sep 20, 2015Updated 10 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- phpldapadmin remote exploit and vulnerable container !☆13Nov 9, 2018Updated 7 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆22Oct 31, 2018Updated 7 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Sep 20, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code from my old page ge.mine.nu☆36Feb 2, 2024Updated 2 years ago
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- davtest (improved)- Exploits WebDAV folders☆121Mar 7, 2023Updated 3 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- A curated list of awesome Cisco exploitation resources☆70Oct 7, 2017Updated 8 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Bash script to download all lecture videos & notes for a particular course on Coursera.org.☆13Dec 25, 2015Updated 10 years ago
- ☆16May 22, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Сollection of TCL scripts for Cisco IOS penetration testing☆69Jul 17, 2018Updated 7 years ago
- this is some scripts for pentesting zabbix server☆13Feb 25, 2018Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Aug 30, 2016Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 12 years ago
- ☆77Jul 4, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆94Nov 16, 2018Updated 7 years ago
- Slides of mine.☆12Apr 19, 2024Updated 2 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆15Sep 9, 2012Updated 13 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- Extract data from a .git directory.☆15Mar 28, 2023Updated 3 years ago
- OSINT scanning tool which discovers and maps directories found in javascript files hosted on a website.☆227Feb 24, 2019Updated 7 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago